Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 269355 - Kernel: proc: avoid information leaks to non-privileged processes (GENERIC-MAP-NOMATCH)
Summary: Kernel: proc: avoid information leaks to non-privileged processes (GENERIC-MA...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard: [linux <2.6.27.23] [linux >=2.6.28 <2...
Keywords:
Depends on:
Blocks:
 
Reported: 2009-05-11 02:28 UTC by Jim Faulkner
Modified: 2013-09-12 04:44 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jim Faulkner 2009-05-11 02:28:44 UTC
It was recently reported that there are some vulnerabilities in the Linux kernel that can allow someone to bypass address space layout randomization (ALSR):
http://lwn.net/Articles/330866/

This is fixed in 2.6.29.3 (see commit f83ce3e6b02d5e48b3a43b001390e2b58820389d):
ftp://ftp.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.3


Reproducible: Always